Free Essay

Securing the Usb Drive

In:

Submitted By ashlee78006
Words 3010
Pages 13
Technical Writing Project Coversheet

Capstone Proposal Project Name: Securing the Universal Serial Bus Interface for the Enterprise Environment

Student Name: Steve Wild

_

Degree Program: Bachelor of Science in Information Technology – Security Emphasis

_

Mentor Name: Yolanda DuPree____________________________________________________

Signature Block: Student’s Signature: _______________________________________________________

Mentor’s Signature: _______________________________________________________

Running head: SECURING THE USB INTERFACE 1

Securing the Universal Serial Bus Interface for the Enterprise Environment Steve Wild Western Governor’s University

SECURING THE USB INTERFACE 2

Summary The USB interface is one vector of possible attack against a company and must be proactively defended against data theft, data loss, and corporate espionage in order for a company to maintain a secure enterprise environment, minimize downtime, and maximize productivity. Project Goals and Objectives There are several goals that will be accomplished during this project: explore the hardware problems, explore the software problems, explore the policy problems, and give real world examples. The objectives are: provide example hardware solutions, provide example software solutions, provide example policy solutions, and to provide a concise best practices guide in the conclusion. Project Deliverables The deliverables of this project are the review of other works, the discussion, and the conclusion. The review of other works will look at several different articles and reports from at least 5 different sources and review them within the scope of this project. The discussion will include the bulk of the content: hardware problems and solutions, software problems and solutions, policy problems and solutions, and a couple of real world examples. The conclusion will contain summarized best practice guidelines designed to be applicable to many situations and environments. Project Timeline and Milestones The project timeline is a total of 3 weeks. The first 2 weeks will be spent researching the necessary data. The last week will be spent writing the paper and

SECURING THE USB INTERFACE 3

conclusion then submitting them for grading. The milestones will be the conclusion of the research, the conclusion of the report, and the submission of the project. Review of Other Work SanDisk released a survey on April 9, 2008, regarding risk from unsecured USB flash drives. They found that a staggering 77 percent of corporate end users surveyed brought personal flash drives into the environment for work-related purposes. This is even more shocking when IT Managers surveyed expected to see an answer closer to 35 percent. In my experience, 77 percent is a little low. I believe the number should be much closer to 100 percent since it is likely that a few people answered the survey with what they thought the surveyors wanted to hear. With the release of Windows 7, Microsoft expanded upon their BitLocker encryption, originally offered as a package included in Windows Vista, with the release of BitLocker To Go, designed specifically for removable storage devices. Now network administrators are able to decide exactly how much freedom is required in their environment and adjust permissions as needed. They can allow only encrypted devices or allow read only access to unencrypted devices. To allow sharing of data with Windows XP, they can also allow read only access of BitLocker To Go encrypted devices (Microsoft, 2009). SC Magazine performed a similar, outdated study in 2007. They found many solutions available, but for the most part were very limited in scope and, while useable, ultimately not useful enough to be used in demanding enterprise environments. Ultimately, they were unable to find a comprehensive solution.

SECURING THE USB INTERFACE 4

TechTarget.com released a very inclusive wish list which follows much of my process throughout this investigation including: which devices are allowed, when those devices are allowed, who can use those devices, and which types of data can be transferred. They also mention that encryption should be enforced (Cobb, 2009). As usual for TechTarget.com, they give a very high level overview without going into any real depth. An undated Net-Security.org article gives a listing of recent incidents, including the oft-used incident outside of Bagram, Afganistan by the U.S. Army. It then goes on to describe risks and enterprise concerns including examples of data leakage, regulatory compliance, and lost data. The next section on possible solutions is quite glib at only 3 sentences rendering the 7 Steps to Securing Personal Storage Devices section, after which the article is titled, a shallow attempt. This article is possibly the best summary to be found on this topic and yet is quite lacking. This project will go into further detail regarding ways to secure the environment. There are many single topic articles to be found such as informIT’s USB Hacks paper regarding the U3 autorun procedure (Fogle, 2007). You can also find many white papers published on the National Institute of Standards and Technology’s website, nist.org, but these are not meant for consumption by executives. There is relatively little to be found that could be regarded as a comprehensive or conclusive guide. Hopefully, this project will provide a little headway in that direction.

SECURING THE USB INTERFACE 5

Discussion "The only secure computer is one that's unplugged, locked in a safe, and buried 20 feet under the ground in a secret location – and I'm not even too sure about that one." -- Dennis Hughes, FBI. IT Security has many possible vectors of attack ranging the entire gamut from accidental loss to data theft to hacktivism. These vulnerabilities can take many forms: viral, logical, physical, or even environmental. Contrary to popular opinion, the absolute greatest risk doesn’t come from the media hyped hackers, sitting in their parent’s damp, dark basement, coming in over the ‘net; instead it comes from those with physical access to hardware: employees, contractors, even government and corporate spies. While many people should take notice of someone walking in to or out of a building toting a computer under their arm, a tiny USB drive is much more discrete, easily hidden in pocket change or on a keychain, tossed in a backpack or a purse, even deviously hidden in mundane objects such as coffee cups or credit cards. These devices can be smuggled past the most stringent of security practices, into an organization’s most sensitive areas, like the one mentioned by Mr. Hughes. These devices can house something as simple as customer data or as complex as a program designed to wipe every hard drive squeaky clean. Because of these factors, the USB interface must be secured through hardware, software, and policy. There are many different attacks possible with a USB device, the most common of which is simple data theft. Customer data is valuable for many reasons, the least of which is the customer’s contact information that can be used by a competitor. There is also pricing data that a competitor can use to undercut you and steal your customers. Another method of corporate espionage involves reducing a competitor’s productivity. This could be performed by simply

SECURING THE USB INTERFACE 6

causing excessive network congestion or by disabling some cores on multi-core processors. These are attacks that are not expected and there is very little defense against, most especially for small businesses that can’t afford the expensive equipment that could possibly detect the act in progress. Another attack uses purposefully placed USB devices. These devices are strategically planted in specific locations so that they will be found by employees of the business and then used on a business computer. USB devices are plug-and-play, meaning that there is no software that has to be installed prior to use. A very useful abuse of this technology entails putting software on the drive that automatically starts upon insertion to a PC. This software can be written to push a virus on to the host computer and then replicate over the company’s internal network, infecting all computers and reducing or even halting productivity. A worst case example would be putting a USB device in a bank parking lot, early in the morning, so that it will be found by bank employee and taken into the building. Eventually, that USB device will be inserted into a PC on the bank’s internal network. Upon insertion, a virus is copied over to that computer. The virus then automatically spreads to all computers on the bank’s internal network. Upon a specific time and date, the virus’s primary function will then be activated. Since the virus has spread internally, firewalls will not be able to protect the bank’s network. This is a new virus that has not ever been used before, so there are no antivirus definitions available. The virus could then attack in a variety of ways. It might simply erase a critical system file causing all workstations to not be able to boot. It could be used to establish a botnet that could then be used to perform a more powerful attack without being traced back to the responsible party. It may use a SQL injection attack to change data in the customer database; for example: account balances, billing addresses, names, PIN numbers, and etcetera. It might

SECURING THE USB INTERFACE 7

covertly make these changes to the backup database while corrupting the active database, causing the backup database to be activated. It could simply steal credit card data and send it out over the internet. The possibilities are as endless as the hacker’s imagination. Accidental loss of data happens when a USB device holding sensitive data is actually misplaced, as opposed to purposely misplaced in the previous example. As a salesman was planning a vacation and giving his customer information to another salesman in the company, he copied the customer data to a USB device but when he went to give it to the other salesman; he couldn’t find the device. This kind of loss is one of the worst things that can happen for a company. Even though the device may never be found and a data breach may never happen, by law the company must notify all customers that could be affected by the data loss. This incompetence reflects poorly upon the company and can cause customer distrust. There are three basic ways to protect against a USB based attack: hardware security, software security, and security policy. It takes the combination of all three in order to effectively protect the enterprise. Hardware security is something that, while being easy to implement, is often over looked. A system’s BIOS can be password protected and then set to disable some or all of the USB ports on the computer. This protection is only as secure as the BIOS password. Many times technicians will need the BIOS password in order to troubleshoot issues on a computer, so this shouldn’t be the sole protective measure. Some might ask why you would disable only select USB ports. It may be prudent to disable the USB ports on the back of a computer to reduce the chance of a USB based keylogger or remote access device to go unnoticed for extended periods of time. People are more likely to notice a new device plugged into the front of their computer, whereas they may have never even glanced at the back.

SECURING THE USB INTERFACE 8

Another hardware based solution is self-encrypting secure USB devices. These are devices that ask for a password in order to be used. Some have keypads on the USB device that require the code be punched in. Others use biometric security, asking for a thumbprint to unlock the device. Some of these devices use software based security which will be disabled by a prompt on the computer when the device is accessed. Some devices will employ a combination of hardware and software based security methods. There are many software based security packages. A very simple and fairly secure example is BitLocker that comes with Windows Vista, Windows 7, and Windows 8. It is designed to encrypt hard drives with an unbreakable encryption scheme using a key that is stored on an external device such as a USB device, smartcard, or a central server (Microsoft, 2009). IronKey has an all-inclusive enterprise security USB device that uses a combination of hardware and software. Using the IronKey USB drive, you can securely transfer files without worry of data loss. In order to access the drive, as soon as it is inserted into a computer, it accesses a central server which then prompts the user for a password, key, or biometric scan. If the password is not supplied, the drive can then be locked, causing the device to be returned to administration to be unlocked, or wiped clean, destroying all data on the drive (IronKey, 2012). Not all forms of encryption are equal, as is shown in IronKey’s submission to the NIST. Their drive, produced by Imation, meets the security requirements of the Federal Information Processing Standards Publication version 2, or FIPS 140-2, Level 3 (ImationCorp, 2011), which requires physical security mechanisims, including tamper-detection switches. There is a Level 4 specification, requiring environmental monitoring (Ambrose, 2009), that is not currently available in any unclassified device that I could find. This makes IronKey one of the most

SECURING THE USB INTERFACE 9

secure products available to date. IronKey’s solution is also one of the quickest, easiest to implement of the available options, but unfortunately one of the most expensive. Security Policy is often haphazardly, reactively thrown together after an attack has occurred. However, there are many published proactive solutions that include IT Security from both governments and industry organizations. COBIT, published by the ISACA, is in its 5th generation and is highly regarded as an industry standard framework for enterprise IT (ISACA, 2012). ITIL, or the IT Infrastructure Library, is 20 years old and on its 3rd version. It is published by the UK’s Office of Government Commerce and is the most widely used standard in the world (APM Group Ltd, 2011). The International Organization for Standardization, or the ISO, has developed ISO27k, a series of publications relating to IT Security, which has been adapted by many organizations and is part of the basis of both COBIT and ITIL (“ISO/IEC 27000-series”, n.d.).

SECURING THE USB INTERFACE 10

References Ambrose, John R., & Malinaik, Lisa. (2009) IC Simplifies Support For FIPS 140-2 Level 4 Digital Encryption. ElectronicDesign.com. Retrieved from http://www.electronicdesign.com/article/digital/ic_simplifies_support_for_fips_140_2_le vel_4_digital_encryption. APM Group Ltd. (2011). What Is ITIL?. Retrieved from http://www.itilofficialsite.com/AboutITIL/WhatisITIL.aspx. Cobb, Michael. (2009). How to secure USB ports on Windows machines. Retrieved from http://searchsecurity.techtarget.com/answer/How-to-secure-USB-ports-on-Windowsmachines. Fogle, Seth. (2007). Security Reference Guide: USB Hacks. ImformIT.com. Retrieved from http://www.informit.com/guides/content.aspx?g=security&seqNum=263. IronKey. (2012). Retrieved on May 20, 2012, from https://www.ironkey.com. ImationCorp. (2011). Imation S200/D200. Retrieved from http://csrc.nist.gov/groups/ STM/cmvp/documents/140-1/140sp/140sp1149.pdf. ISACA. (2012). COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. Retrieved from http://www.isaca.org/COBIT/Pages/default.aspx. ISO/IEC 27000-series. (n.d.). In Wikipedia. Retrieved May 20, 2012, from http://en.wikipedia.org/wiki/ISO/IEC_27000-series. Microsoft. (2009). Windows 7 Security Enhancements. Microsoft | TechNet. Retrieved from http://technet.microsoft.com/en-us/library/dd560691.aspx.

SECURING THE USB INTERFACE 11

Reichenberg, Nimrod. (n.d.). 7 Steps to Securing USB Drives. Retrieved from http://www.netsecurity.org/article.php?id=958. SanDisk Corporation. (2008). SanDisk Survey Shows Organizations at Risk from Unsecured Usb Flash Drives;Usage is More than Double Corporate IT Expectations. Retrieved from http://www.sandisk.com/about-sandisk/press-room/press-releases/2008/2008-04-09sandisk-survey-shows-organizations-at-risk-from-unsecured-usb-flash-drivesusage-ismore-than-double-corporate-it-expectations. Stephenson, Mike. (2007). USB Security 2007. Retrieved from http://www.scmagazine.com/usbsecurity-2007/grouptest/19/.

Capstone Competency Matrix
The purpose of the Competency Matrix is to give you the opportunity to state precisely which competencies are demonstrated in your capstone. Your capstone should demonstrate your mastery of at least ten different competencies from the following domains: Leadership and Professionalism, Upper Division Collegiate Level Reasoning and Problem Solving, Language and Communication, and Quantitative Literacy. The capstone will also demonstrate competency in at least one of the following Information Technology domains: Software, Networks, IT Management, Project Management, Security, or Databases. If you have selected an emphasis for your degree, at least one of the selected domains must reflect the emphasis area. For example, if you are enrolled in the BS IT Security Emphasis degree program, you must demonstrate competency in the security domain, although other competencies may be demonstrated as well. In the second column, write the competency you are demonstrating (do not just list a number). In the first column, write the domain to which the competency belongs. In the third column, give a brief explanation of how the capstone demonstrates mastery of the competency. Domain/Subdomain Leadership and Professionalism Leadership and Professionalism Upper Division Collegiate Level Reasoning and Problem Solving Upper Division Collegiate Level Reasoning and Problem Solving Language and Communication Language and Communication Quantitative Literacy Competency Organizational Culture Change Management Planning and Information Gathering Analysis and Interpretation of Information/Data Documenting Sources Adaptation Explanation I explain how to foster an environment of security through proper training of employees. I explain how to change from insecure to secure environment. I researched through many sources finding appropriate data for this topic, ruling out sources that were questionable or irrelevant. This topic required me to read through and compare many articles and compile information into a usable format. All sources are documented in APA format. The conclusion will be written for a specific audience of managers and IT professionals. Choosing which method takes priority is based on the statistical probability of attack and total risk of successful attack. Interpreted technical white papers into material intended to be read by a larger audience. Device Security is this project’s focus. I show how to protect data for the enterprise.

Applying Probability & Statistics Interpreting & Communicating Quantitative Information Device Security Data Security

Quantitative Literacy

Security Security

Similar Documents

Premium Essay

Security Domains and Strategies

...User Domain Vulnerabilities * CD dives and usb ports Disable internal drives and usb ports and enable auto antivirus scanning for any inserted media and email attachments * User destruction of data or systems Restrict access to job essential systems/applications. Keep write permissions to a minimum. Workstation Domain Vulnerabilities * Download of photos music and videos from the internet Enable content filtering and workstation auto antivirus scans for all new files * Desktop/laptop application software vulnerabilities Establish a software vulnerability upgrade procedure and push software and security patches in a timely manner LAN Domain Vulnerabilities * Unauthorized access to LAN Implement security measures to gain access to data closets/centers. ie. Access ID cards. * Securing confidentiality of data transmissions via WLAN Use encryption for all wireless transmissions on the WLAN. LAN-to-WAN Domain Vulnerabilities * Router, firewall, and network OS software vulnerabilities Apply security fixes and software patches right away with a 0 day WoV * Unauthorized network probing Disable ping, probing, and port scanning on all external network enabled devices in the domain. WAN Domain Vulnerabilities * Easy to eavesdrop on Use VPN’s and encryption for all transmissions * DoS, DDoS attacks Enable filters to firewalls and router WAN interfaces to block TCP SYN and ping. Remote Access Domain Vulnerabilities * ID and password attacks...

Words: 283 - Pages: 2

Free Essay

Hello World

...Dell Precision Workstation T7600 Owner's Manual Regulatory Model: D02X Regulatory Type: D02X001 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 Dell Inc. Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, Precision ON™,ExpressCharge™, Latitude™, Latitude ON™, OptiPlex™, Vostro™, and Wi-Fi Catcher™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core™, Atom™, Centrino®, and Celeron® are registered trademarks or trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom™, AMD Sempron™, AMD Athlon™, ATI Radeon™, and ATI FirePro™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, MS-DOS®, Windows Vista®, the Windows Vista start button, and Office Outlook® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Blu-ray Disc™ is a trademark owned by the Blu-ray Disc Association (BDA) and licensed for use on discs and players. The Bluetooth® word mark is a registered trademark and owned by the Bluetooth® SIG, Inc. and any use of such mark by Dell Inc. is under license. Wi-Fi® is a registered trademark of Wireless...

Words: 10947 - Pages: 44

Free Essay

Lackcjj

...the LifeBook over and remove the Battery. 2. Slide out the optical drive. 3. Extract 2 screws from the Hard Disk Drive cover. 4. Lift the cover off. 5. Extract 1 screw from the drive. 6. Slide it to the left to disconnect it, and lift it out. 7. Extract 2 screws from the RAM cover. 8. Lift the cover off. 9. Press out on the locking clips to release the RAM and lift it out. 10. Extract 17 lower case screws. 11. Turn the LifeBook over, open it slightly and stand it on its front. 12. Use a plastic screwdriver to release 1 clip behind each of the 2 hinges. 13. Open the LifeBook and lay it flat. 14. Pry up the Status/Application panel cover with a plastic screwdriver. 15. Disconnect the speaker cable. 16. Lift up the keyboard and slide it back. 17. Disconnect its cable. 18. Extract 4 screws from the metal shield. 19. Lift the shield out. 20. Disconnect the 2 antenna cables from the WLAN card. 21. Disconnect the Display cable from the system board. 22. Extract 2 screws from each of the 2 hinges. 23. Lift the display off. 24. Extract 1 screw from the status LCD bracket. 25. Disconnect the LCD’s cable. 26. Slide the LCD and bracket out. 27. Disconnect the application panel cable. 28. Turn the assembly over and release the tabs securing panel. 29. Turn the assembly back over and lift the panel off. 30. Extract one screw securing the upper case. 31. Disconnect the GlidePoint cable. 32. Lift the...

Words: 714 - Pages: 3

Free Essay

Network Design

.................. Page 9 References ....................................................................................................................... Page 10 1. Network Architecture/Model The definition of "network architecture" is as follows: "Network architecture refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as wired or wireless." The existing hardware is currently 7 computers in which each computer consists of: Pentium 4 at 3.0 GHz; 100-GB IDE hard drive; 512 MB of memory, floppy drive; CD-ROM; 64MB memory video card; 1 parallel port; 1 serial port; and 1 USB 2.0 port. When the donation takes place, the total amount of computers increase from 7 to 14 (each computer with the same preceding hardware components. After the donation, the USB 2.0 ports on each computer will be replaced by USB 3.0 ports. The existing software is currently Windows XP Home Edition running on each...

Words: 1150 - Pages: 5

Premium Essay

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a company...

Words: 532 - Pages: 3

Premium Essay

Upgrading a Pc

...Upgrading a PC Rodolfo Garcia Jr. EET250 Computer Configuration I ECPI University Abstract This paper covers the topics of upgrading a PC with new components such as RAM, Wireless Devices, larger Hard Drive, and a new Optical drive. This paper will discuss the prices and benefits of performing these upgrades. Keywords: Motherboard, CPU, RAM, PCI, SATA, technician, wireless keyboard, wireless mouse, USB, Hard Drive, Optical Drive, DVD, Blu-Ray, HDMI, 1080p video. Upgrading a PC As technology changes, so does the needs of the average PC user. When technology outpaces the capabilities of your PC, many people choose to upgrade their device instead of purchasing a completely new system which sometimes happens after a couple of months. There are several ways to upgrade a PC to keep it up to date with the emerging technology. When the motherboard and CPU are relatively newer, they are often capable of keeping up with the newest demands placed on them, however other components could benefit from an upgrade to improve performance and stability. Some of the most common upgrades include new or additional RAM, wireless devices such as a keyboard and mouse, larger and/or faster hard drive, and a new optical drive that is capable of handling the demands of new video and storage capabilities. Upgrading RAM is probably the single best option for improving speed and performance of a system. When it comes to upgrading RAM there are a few things to keep in mind such as the capabilities...

Words: 1257 - Pages: 6

Premium Essay

Microcontroller

...Dell™ OptiPlex™ FX160/160 Service Manual  Working on Your Computer System Setup Selective USB Reinstalling Software Troubleshooting Computer Stand Covers Hard Drive Assembly (Optional) NVRAM Module Wireless Card I/O Board Power Supply Processor Heatsink Assembly Memory Coin-Cell Battery Cable Guide Antenna System Board Assembly Getting Help Finding Information  Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. If you purchased a Dell™ n Series computer, any references in this document to Microsoft® Windows® operating systems are not applicable. Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, and OptiPlex are trademarks of Dell Inc.; Intel is registered trademarks of Intel Corporation in the U.S. and other countries; Microsoft, Windows, Windows Vista, the Windows Start button, and Outlook are registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the...

Words: 18309 - Pages: 74

Free Essay

It 255 Project Part 2 Richman Investments Project Part Ii

...instilling confidence and trust with data on the network. 4. Keep high standards of security with the use of protected and restricted data. 5. Avoid malicious network intusions. 6. Prevent unintended or malicious harm on the Richman Investments data network. Applicable Parties This policy applies to all Richman Investment employees, members, committees, business partners, third party IT services, guests, or anyone who is approved access to the data network, IT hardware resources, or any equipment with means of access to files within Richman Investments. Removable Devices Defined 1. USB Memory sticks (flash drive) 2. USB or external hard drive 3. Media Card Readers 4. Embedded microchips (smart cards, mobile phone SIM cards) 5. MP3 or Ipod players 6. Cameras 7. Any media device with storage space with means of transfer via Bluetooth, WIFI, or USB cord. 8. Any device with means to record data Risk Assessment Richman Investments recognizes the risks associated with users using and accessing data in order to properly conduct assigned tasks, jobs, or conduct...

Words: 1105 - Pages: 5

Free Essay

Top 10 Reasons

...endpoints through a web-based console and know your data is safe with full-disk encryption. ® ® Novell helps you: Manage more devices Balance security and employee productivity without compromising on either Access configuration and inventory, locationaware security and proactive patching through a single unified web console and adaptive agent Give users the ability to access what they need from wherever they are ZENworks 11 SP2 adds significant new capabilities to make your job easier, your users happier and your data more secure. In addition to Windows and Linux management, you can now manage Mac devices using the same web-based console and adaptive agent. Full disk encryption together with integrated endpoint security management makes securing data on your Windows endpoints automatic. And the web-based console makes management a snap from any device, including tablets. These and hundreds of other improvements make upgrading to ZENworks 11 SP2 the right decision. Top 10 Features that Make Managing Your Endpoints Easier, More Secure and More Flexible with Novell ZENworks 11 SP2: 01 02 03 Extend management to Mac OS X. With Novell ZENworks 11 SP2 you can now use ZENworks software deployment, inventory, remote management, patch management and asset management for your Mac OS X 10.5 and higher devices. This means you can now manage these devices the same way you manage your existing Windows and Linux devices. Secure your data by using Novell ZENworks Full Disk Encryption...

Words: 884 - Pages: 4

Premium Essay

Impact of a Data Classification Standard

...Impact of a Data Classification Standard Sir: The following IT infrastructure domains that are being affected by the “Internal Use Only” data classification are: the user domain, the workstation domain, the LAN to WAN domain, and the remote access domain. Each of these has their own sets of problems. I will describe each problem for each domain and make a recommendation on how to rectify the situation. The user domain is where the access rights for each employee starts. I observed that many of the employees were not following the company’s policies of securing data. When questioned several of the employees stated that they were not aware of the policies. I would recommend that there is a semiannually security awareness training conducted for all employees. I also noted that there were quite a few individuals using personal USB drives with personal photos, music, and documents on them. I would recommend that each time an employee plugs in a personal device to a computer that an automatic scan occur with no way for the employee to stop the scan. The workstation domain is the second domain that I observed data compromising occurring. In my observations I noticed that many of the employees do not log off or lock their computer screens when they are away from their computer thereby making it easy for anyone to walk by and have access to the information they are authorized to use. I have several recommendations for this. One is to post a memo reminding employees...

Words: 496 - Pages: 2

Premium Essay

Virtual Private Networks

...Virtual Private Networks Table of Contents 1. AJAX Executive Summary 3 2. VPN Summary 4 3. VPN–The Technology 5 4. AJAX Network 6 5. Technical Specifications 8 6. Feasibility and Operational rollout 10 7. Conclusion 11 8. Bibliography 12 AJAX Executive Summary AJAX was founded in 1996 by a group of professional traders who wanted to perform their own clearing functions. Those traders were, for the most part, located in the Chicago area and traded primarily on the Chicago derivative exchanges. The company quickly flourished by providing clearing services to colleagues on the exchanges. This expansion was the result of simple word-of-mouth relationships. AJAX Clearing Corporation (AJAX), a division of Johnston Trial’s Professional Clearing Corp, is a registered clearing firm that provides order routing, execution, and clearing for equities, futures and options. They also provide their customers with analytics, risk management, position management, and compliance support. In addition, they offer extensive standard and specialized reporting support that includes derivatives, pricing and valuation reports and haircut reports. Attracted by AJAX’s reputation for cutting edge technology and superior trade execution, Johnston Trial acquired AJAX in April 2005. AJAX offers dynamic capabilities, like real-time trade clearing, compared to other Johnston clearing solutions. AJAX...

Words: 1935 - Pages: 8

Free Essay

Ethics

...Security measures are the different procedures taken by an organization to secure their networks against threats that internally exist within the organization as well as externally. As for Dar Al-Hekma college different security measures are taken. The first and foremost action taken by Dar Al –Hekma college in order to secure their network against threats is by having both software firewall as well as hardware firewall in one device called cyberoam as well as MacAfee anti-virus . A firewall is a system designed to prevent unauthorized access to or from a private network.It is located at a network gateway server. A firewall plays an important role on any network as it provides a protective barrier against most forms of attack. It controls the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set by the organization using. There are two types of firewall: * Software Firewall: Is a software program installed in any computer in order to protect it. Software firewalls is best suited for protecting computers from Trojan programs, e-mail worms, or spams. It prevents any unauthorized access. An example of software firewall includes Zone Alarm, Sygate, Kerio. An illustration is shown below: * Hardware firewall: Is a device which connects your computer or network in order to protect them from unauthorized access. An example of hardware firewalls includes Linksys...

Words: 741 - Pages: 3

Premium Essay

Project Part 1 Multilayered Security Plan

...attacks start of in the Application layer, and that’s only because it is the layer most of us are familiar with. This layer deals with the user. In order to prevent an attack on this layer security measures need to be set. For example, anti-viruses can scan systems for unwanted malicious programs from contaminating the system by scanning files and drives as well as program that could be potentially downloaded either by accident or on purpose. Policies can also be provided to employees stating that they are only allowed to do certain things on company systems. Once the employee has signed such policy, if they ever violate it, they can be reprimanded or terminated, depending on the severity of their actions. In the Presentation Layer, data is encrypted. In order to protect this layer, a complex for of encryption should take effect. Encryption such as AES could be implemented in order to avoid data from being decrypted easily. The Session Layer deals with communication between hosts. We can protect this layer by using encrypted VPN’s as well as secured connections. The Transport Layer and the Session Layer work closely together. By securing each connection, we can prevent data loss as well as bandwidth usage. If something is taking up a large amount of bandwidth, it is usually not a good sign. For the Network Layer, packets need to be encrypted. In order to keep this layer under control, firewalls should be in place with protocols preventing the use of sites that can potentially...

Words: 472 - Pages: 2

Free Essay

Computer Forensics

...Computer Forensics The world of crime has expanded right along with the explosion of the internet. The modern cyber criminal has veritable global playground in which to steal money and information from unsuspecting victims. Computer forensics is a quickly emerging science against the increasingly difficult battle to bring criminals to justice who perpetrates crimes on others. The computer forensics field is a relatively new investigative tool but enjoys continual advances in procedures, standards, and methodology which is making the identification, preservation, and analyzing of digital evidence a powerful law enforcement apparatus. The job of the cyber forensic professional is to look for clues the attacker left behind on web sites, servers, and even the e-mail message itself that will unravel their sometimes carefully woven veil of secrecy. Attackers come in all forms and from a variety of different circumstances. For instance, an attacker can begin a phishing scam with only a web server they control with very little programming experience and a way to send a lot of e-mail messages. (Jones 4) In order to combat the waves of cyber-attackers, we must utilize Open Source Community applications to combat the continual onslaught of infections, exploitations, and trickery employed everyday against our systems and networks. Today's attacker uses a variety of technologies to employ their methods and understanding those abilities is integral to preparing for an investigation...

Words: 2742 - Pages: 11

Premium Essay

Securing and Protecting Information

...Securing and Protecting Information Securing and Protecting Information CMGT/400 May 27, 2013 Securing and Protecting Information Introduction The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process...

Words: 1094 - Pages: 5